keywords: Android, mobie device, IoT, AI, social nerwork
- (2018) SoK: "Plug & Pray" Today - Understanding USB Insecurity in Versions 1 through C
- (2018) Do You Feel What I Hear? Enabling Autonomous IoT Device Pairing using Different Sensor Types
- (2017) IoT Goes Nuclear: Creating a Zigbee Chain Reaction
- (2017) SmarPer: Context-Aware and Automatic Runtime-Permissions for Mobile Devices
- (2016) No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis
- (2016) SoK: Lessons Learned From Android Security Research For Appified Software Platforms
- (2015) Effective Real-time Android Application Auditing
- (2015) What the App is That? Deception and Countermeasures in the Android User Interface
- (2015) Leave Me Alone: App-level Protection Against Runtime Information Gathering on Android
- (2017) Hindsight: Understanding the Evolution of UI Vulnerabilities in Mobile Browsers
- (2017) DolphinAttack: Inaudible Voice Commands
- (2017) walk2friends: Inferring Social Links from Mobility Profiles
- (2017) Vulnerable Implicit Service: A Revisit
- (2017) Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android
- (2017) A Stitch in Time: Supporting Android Developers in Writing Secure Code
- (2017) Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews
- (2016) Call Me Back!: Attacks on System Server and System Apps in Android through Synchronous Callback
- (2016) The Misuse of Android Unix Domain Sockets and Security Implications
- (2016) Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android
- (2016) TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime
- (2016) Statistical Deobfuscation of Android Applications
- (2016) Reliable Third-Party Library Detection in Android and its Security Applications
- (2016) SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles
- (2016) Computational Soundness for Dalvik Bytecode
- (2016) Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices
- (2016) When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals
- (2015) Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS X and iOS
- (2015) iRiS: Vetting Private API Abuse in iOS Applications
- (2015) GUITAR: Piecing Together Android App GUIs from Memory Images
- (2015) VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images
- (2015) Towards Automatic Generation of Security-Centric Descriptions for Android Apps
- (2015) From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an Application
- (2015) AUTOREB: Automatically Understanding the Review-to-Behavior Fidelity in Android Applications
- (2015) Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References
- (2015) Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations
- (2015) When Good Becomes Evil: Keystroke Inference with Smartwatch
- (2012) CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities
- (2010) TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones